Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
223s -
max time network
226s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/01/2024, 19:47
Behavioral task
behavioral1
Sample
41c156bd08fc9f69b8dcc2b95ff8e0aa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41c156bd08fc9f69b8dcc2b95ff8e0aa.exe
Resource
win10v2004-20231215-en
General
-
Target
41c156bd08fc9f69b8dcc2b95ff8e0aa.exe
-
Size
220KB
-
MD5
41c156bd08fc9f69b8dcc2b95ff8e0aa
-
SHA1
76c2e8731716d696aa2d8363bbc8c028e0b5b411
-
SHA256
d0484c60132079781e690b1964279b63878f5bf198d73ebcd92b242fdc76ada7
-
SHA512
dc84e39bd14f4f54c17af7ff4eca8674c057cf729356d52fd164b888d7e13854139c0601f1eae5ae55308244938aab3ba72855bd99cb0330ae1236f51f16826a
-
SSDEEP
6144:v6YZemhU4DJaU22U2P3lf3RFkQf8RQM6AVE/Vs:iFdQ93nC8LM6Au
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2012 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 givey.exe -
Loads dropped DLL 2 IoCs
pid Process 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe -
resource yara_rule behavioral1/memory/2592-0-0x0000000000400000-0x0000000000817000-memory.dmp upx behavioral1/memory/2592-1-0x0000000000400000-0x0000000000817000-memory.dmp upx behavioral1/files/0x000a000000012266-6.dat upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Windows\CurrentVersion\Run\{94926AC8-CECC-AD4E-05C4-B4AE0A3C97B3} = "C:\\Users\\Admin\\AppData\\Roaming\\Ukfion\\givey.exe" givey.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2592 set thread context of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe Set value (int) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000\Software\Microsoft\Internet Explorer\Privacy\CleanCookies = "0" 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe 1692 givey.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeSecurityPrivilege 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe Token: SeSecurityPrivilege 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe Token: SeSecurityPrivilege 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2592 wrote to memory of 1692 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 29 PID 2592 wrote to memory of 1692 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 29 PID 2592 wrote to memory of 1692 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 29 PID 2592 wrote to memory of 1692 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 29 PID 1692 wrote to memory of 1124 1692 givey.exe 17 PID 1692 wrote to memory of 1124 1692 givey.exe 17 PID 1692 wrote to memory of 1124 1692 givey.exe 17 PID 1692 wrote to memory of 1124 1692 givey.exe 17 PID 1692 wrote to memory of 1124 1692 givey.exe 17 PID 1692 wrote to memory of 1228 1692 givey.exe 16 PID 1692 wrote to memory of 1228 1692 givey.exe 16 PID 1692 wrote to memory of 1228 1692 givey.exe 16 PID 1692 wrote to memory of 1228 1692 givey.exe 16 PID 1692 wrote to memory of 1228 1692 givey.exe 16 PID 1692 wrote to memory of 1252 1692 givey.exe 9 PID 1692 wrote to memory of 1252 1692 givey.exe 9 PID 1692 wrote to memory of 1252 1692 givey.exe 9 PID 1692 wrote to memory of 1252 1692 givey.exe 9 PID 1692 wrote to memory of 1252 1692 givey.exe 9 PID 1692 wrote to memory of 2592 1692 givey.exe 28 PID 1692 wrote to memory of 2592 1692 givey.exe 28 PID 1692 wrote to memory of 2592 1692 givey.exe 28 PID 1692 wrote to memory of 2592 1692 givey.exe 28 PID 1692 wrote to memory of 2592 1692 givey.exe 28 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30 PID 2592 wrote to memory of 2012 2592 41c156bd08fc9f69b8dcc2b95ff8e0aa.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\41c156bd08fc9f69b8dcc2b95ff8e0aa.exe"C:\Users\Admin\AppData\Local\Temp\41c156bd08fc9f69b8dcc2b95ff8e0aa.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Roaming\Ukfion\givey.exe"C:\Users\Admin\AppData\Roaming\Ukfion\givey.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpfcb9b303.bat"3⤵
- Deletes itself
PID:2012
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1228
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
243B
MD50e12ee7a1bb76a419a045f2739137b68
SHA1c0d5e915b8f1f88dfdb9fb40f93e50626b3ed33a
SHA2568066cb23eecf1715587241bc37aee10eef7b395005b933fcc2216d0743d391fa
SHA512934b57f4d26e6161c0802479963490bd75a8a306ca74e6f922cacc7e91aa049f4de7d7c6f7e7daeab66d19ccde3d7bd61c6334386ed3e87b599a4fbb4963efdf
-
Filesize
366B
MD5e5435d1b72345e1b2a1f2c6ac5fcf44d
SHA1db131fb95ba70628cfff887bf9a1370257c54fb5
SHA256893ebe17febbf89233492d4aed85d0dd5b49a5282868e1d81a77ccf537b2954a
SHA5122462d7266612e874ef7dee2773d59056048956bb7d5e18fbb389feffb771435893778d0d01b5c7881ec86c793a4b2ebed32d7fb5938bb1a942ce8c0e4732eaaf
-
Filesize
220KB
MD5866a4f089b40236ff83bed46ad49d66b
SHA1fc3ab015aa204148d20961c9a316374b5c0441f6
SHA2560318378ecd6b44933f0107e58fa84f4f5a504d576a161be6beb82ca2c8c76161
SHA512c91da7cbb844f98d2368a3fd998e50414da6c0513db444e504e56560ed3f1e25f73018fd8120236c53278d32fdf0e1060e5e41e4bf40acdb0bb65df23799f9a6